語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Lattice-Based Public-Key Cryptograph...
~
Verbauwhede, Ingrid.
Lattice-Based Public-Key Cryptography in Hardware
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Lattice-Based Public-Key Cryptography in Hardware/ by Sujoy Sinha Roy, Ingrid Verbauwhede.
作者:
Sinha Roy, Sujoy.
其他作者:
Verbauwhede, Ingrid.
面頁冊數:
XV, 101 p. 17 illus., 9 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Order, Lattices, Ordered Algebraic Structures. -
電子資源:
https://doi.org/10.1007/978-981-32-9994-8
ISBN:
9789813299948
Lattice-Based Public-Key Cryptography in Hardware
Sinha Roy, Sujoy.
Lattice-Based Public-Key Cryptography in Hardware
[electronic resource] /by Sujoy Sinha Roy, Ingrid Verbauwhede. - 1st ed. 2020. - XV, 101 p. 17 illus., 9 illus. in color.online resource. - Computer Architecture and Design Methodologies,2367-3478. - Computer Architecture and Design Methodologies,.
Introduction -- Background -- Discrete Gaussian Sampling -- Ring-LWE Public Key Encryption Processor -- Modular Architecture for Somewhat Homomorphic Function Evaluation -- Recryption-Box Assisted Homomorphic Function Evaluation -- Conclusions and Future Work.
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
ISBN: 9789813299948
Standard No.: 10.1007/978-981-32-9994-8doiSubjects--Topical Terms:
670104
Order, Lattices, Ordered Algebraic Structures.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Lattice-Based Public-Key Cryptography in Hardware
LDR
:02470nam a22004095i 4500
001
1025218
003
DE-He213
005
20200701025414.0
007
cr nn 008mamaa
008
210318s2020 si | s |||| 0|eng d
020
$a
9789813299948
$9
978-981-32-9994-8
024
7
$a
10.1007/978-981-32-9994-8
$2
doi
035
$a
978-981-32-9994-8
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
100
1
$a
Sinha Roy, Sujoy.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1321440
245
1 0
$a
Lattice-Based Public-Key Cryptography in Hardware
$h
[electronic resource] /
$c
by Sujoy Sinha Roy, Ingrid Verbauwhede.
250
$a
1st ed. 2020.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
XV, 101 p. 17 illus., 9 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
505
0
$a
Introduction -- Background -- Discrete Gaussian Sampling -- Ring-LWE Public Key Encryption Processor -- Modular Architecture for Somewhat Homomorphic Function Evaluation -- Recryption-Box Assisted Homomorphic Function Evaluation -- Conclusions and Future Work.
520
$a
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
650
2 4
$a
Order, Lattices, Ordered Algebraic Structures.
$3
670104
650
2 4
$a
Cryptology.
$3
1211076
650
1 4
$a
Circuits and Systems.
$3
670901
650
0
$a
Ordered algebraic structures.
$3
672366
650
0
$a
Algebra.
$2
gtt
$3
579870
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Electronic circuits.
$3
563332
700
1
$a
Verbauwhede, Ingrid.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1074195
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789813299931
776
0 8
$i
Printed edition:
$z
9789813299955
776
0 8
$i
Printed edition:
$z
9789813299962
830
0
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
$3
1269988
856
4 0
$u
https://doi.org/10.1007/978-981-32-9994-8
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入